Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Two-way SSL configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload & Download Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
Configuring on-premises devices
DataSecurity Plus can identify and report on sensitive data strings matching predefined and custom rules on configured on-premises domain devices and workgroups. These can include Windows file servers as well as SMB-based shares on NAS devices, workgroup workstations and servers, and macOS and Linux devices.
For DataSecurity Plus to be able to scan for sensitive data, the target shares on these data sources have to be SMB shares. Furthermore, since DataSecurity Plus is installed on Windows-based machines, only the shares that can be accessed from Windows File Explorer on those machines will be listed for configuration.
Viewing and editing configured devices
To view and edit existing data source configurations, follow these steps:
- Select Risk Analysis from the modules drop-down.
- Go to Configuration > Data Sources > On-prem Devices. On the Configured Devices page, you will see a table listing the configured on-premises devices along with details on the number of shares configured on them, the status of the last data discovery scan on them, and the scan history.
- If you want to view only the devices in a specific domain or workgroup, choose that from the Select Data Source drop-down to filter the list of configured on-premises devices.
- Click the Edit Configuration icon in the Actions column next to the target device.
- Here, you can add to or remove from the list of shares you're currently scanning on that device. You can also rescan individual shares, if required.
- Click Update once you have made your changes.
Adding new devices for scanning
To configure an on-premises domain device or workgroup, follow these steps:
- Select Risk Analysis from the modules drop-down.
- Go to Configuration > Data Sources > On-prem Devices.
- Click the + Add Device button in the top-right corner of the page.
- Select Domain Devices or Workgroups, depending on the type of device you want to add.
- On the Add Device page, select the domain of which the target device is a part.
- Click the + icon next to the Select Device field to open the Select Devices pop-up.
- From the Platform drop-down, select Windows Servers, Windows Workstations, or Non-Windows Devices, depending on the OS used on the target device.
- Once the domain and platform are entered, DataSecurity Plus will fetch and tabulate the devices that can be configured. The list will show the device names, their canonical names, and the OSs on them.
- Select the device you want to configure and click Select to close the pop-up.
- In the Select Objects to Monitor section, click:
- Shares to add shares. Select the desired shares in the pop-up and click Add Shares.
- Subfolders to add subfolders. Enter the target folder path in the Subfolder Share Path text box and click Add.
Tip: If a target device is not listed, try clicking the Refresh Table icon in the top-right corner of the table.
Note: Ensure that the DataSecurity Plus user has read access to the configured shares. This access is required to scan the contents of the shares for rule-matching sensitive data.
For the steps to scan configured devices, refer to the scan configuration help page.